vdub12
New Member
- Reaction score
- 2
Just a heads up to help anyone save some time. Yesterday I got an AV2010 infection in and thought it would be a simple fix like most of them are.
Well the new AV2010 has changed. It now hides behind TDSS and is not as easy to remove as it was in the past. the executables hide in the sys32 and sys32/drivers directory's now rather then app data. I had a hell of a time finding it all and suspected a rootkit but did not think the av line had gotten that advanced.
After finally getting rid of the rogue I was still getting browser redirects and winupdate would not work. It all made since when I found TDSS. the new rogue will not install in a VM so I am loading a fresh copy of Windows XP on an old drive in my test system. I am going to do a test infection to make sure but it looks like the rogue are going to start using rootkits.
Hope we can keep up,
anyway hope this info helps everyone.
Well the new AV2010 has changed. It now hides behind TDSS and is not as easy to remove as it was in the past. the executables hide in the sys32 and sys32/drivers directory's now rather then app data. I had a hell of a time finding it all and suspected a rootkit but did not think the av line had gotten that advanced.
After finally getting rid of the rogue I was still getting browser redirects and winupdate would not work. It all made since when I found TDSS. the new rogue will not install in a VM so I am loading a fresh copy of Windows XP on an old drive in my test system. I am going to do a test infection to make sure but it looks like the rogue are going to start using rootkits.
Hope we can keep up,
anyway hope this info helps everyone.